0x0d / lrc
Fast Wi-Fi hijacker in C, based on AirPwn ideas and LORCON
☆21Updated 6 years ago
Related projects: ⓘ
- Scripts and tools for ISM hacking☆15Updated 6 years ago
- NAT Pinning test suite tool for penetration testers.☆30Updated 10 years ago
- HackRF / RTLSDR Spectrum Scanning Interface (WIP)☆26Updated 8 years ago
- ZigBee hacking tools and scripts☆12Updated 6 years ago
- ☆15Updated this week
- For collecting probed SSID name by wireless devices, Access point detail and connected clients.☆34Updated 10 years ago
- Brisket is a collection of frontend scripts for masscan, zmap, and nmap, in addition data manipulation scripts☆28Updated 10 years ago
- RFID spoofing code from scanlime.org☆19Updated 12 years ago
- RExploit (Router Exploitation) is a tool that search exploits for any router SOHO. It is written on Python and QT.☆24Updated 8 years ago
- Format string exploit generation☆9Updated 9 years ago
- (◍•﹏•) - Hi, I'm Eve☆21Updated 6 years ago
- ☆13Updated this week
- ☆15Updated 7 years ago
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆24Updated 7 years ago
- A sample android application implementing Moxie's Certificate Pinning Library☆8Updated 9 years ago
- SNMP Backdoor Communication Channel☆15Updated 12 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆17Updated 6 months ago
- Magnetic stripe spoofer implementing audio waves.☆37Updated 7 years ago
- Some code snapshot that can be used to craft your own tool/exploit☆14Updated 9 years ago
- ☆21Updated this week
- A strcmp timing attack example☆9Updated 9 years ago
- Automating LFI/RFI using Burp Proxy Logs and fimap☆13Updated 12 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 8 years ago
- This device silently hunts its prey, swooping in to gather RFID cards.☆31Updated 2 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆28Updated 10 years ago
- Reference implementation and job creation tool for cracking DES using the crack.sh service☆22Updated 7 years ago
- stuff from my ToorCon 2015 talk☆15Updated 8 years ago
- A continuation of my 'ferret' project that extracts useful information from networks.☆23Updated 10 years ago
- use the Apple CoreText exploit (CVE-2012-3716) and launch an AP to affect all devices within wifi range☆17Updated 9 years ago
- -notes and scripts for online course OffIOT☆12Updated 7 years ago